Blog

Get the Context You Need to Lower Your Risk and Close Unknown Gaps in Your Cybersecurity

Networks change constantly and that creates challenges for IT and security operations. Gaps open exposing pathways that attackers can exploit.…
Blog

XM Cyber Attack Simulation Platform Enables Detection and Response to New Microsoft Exchange Zero-Day ProxyLogon

Just a few short weeks after the massive SolarWinds supply chain hack was made public, global organizations are now contending…
Blog

Join XM Cyber at Big SASIG 2021

XM Cyber is delighted to be attending this year’s Big SASIG virtual conference, to be held this year on March…
Blog

Privilege Escalation and Lateral Movement on Azure – Part 2

Overview This is the second part of XM Cyber series about privilege escalation and lateral movement on Microsoft Azure. Some…
Blog

Why Continuous Attack-Based Vulnerability Management Is the Smartest Way to Identify and Remediate Risks to Your Digital World

Complex, constantly changing digital networks represent an ongoing risk to most organizations. Information technology and cybersecurity teams are overwhelmed with…
Blog

Join XM Cyber at Cybertech Global UAE-Dubai 2021

We are very glad to meet you at the 2021 in-person Cybertech Global event in Dubai, UAE, to be held…
Blog

Join XM Cyber at Swiss Cyber Security Days 2021

XM Cyber is ready to welcome you to the Swiss Cyber Security Days conference, Switzerland’s leading cybersecurity event, to be…
Blog

Before the Payload: Why Focusing on the Staging of Ransomware Will Help Prevent Widespread Damage or Prevent It Completely

We read in the news every day of different ransomware attacks against many different verticals and all sizes of companies.…
Blog

XM Cyber @ bwsecurity day 2021 für die DACH-Region: The Global Challenges in Cyber Security During the Pandemic

Online-VeranstaltungMittwoch, 10. März 2021 10.00 bis 15.15 Uhr (GMT+1) Wir laden Sie herzlich zum ersten  bwsecurity day 2021 (online) für die…
Blog

Introducing MacHound: A Solution to MacOS Active Directory-Based Attacks

As a security researcher at XM Cyber, designing core product support for MacOS was one of my goals last year.…
Blog

Webinar 23.02.2021: Sei Dein Eigener Hacker

Mit XM Cyber gehören kostspielige Penetration Tests von Drittfirmen der Vergangenheit an. Sie sind ab sofort Ihr eigener Hacker und stellen…
Blog

Webinaire 23.02.2021: Soyez Votre Propre Hacker

Les tests de pénétration coûteux effectués par des sociétés tierces appartiennent au passé grâce à XM Cyber vous devenez votre propre…
Blog
1 15 16 17 18 19 30

Request a demo

See what attackers see, so you can stop them from doing what attackers do.